Thursday, April 24, 2025
Homecyber securityHacktivist Group Becomes More Sophisticated, Targets Critical Infrastructure to Deploy Ransomware

Hacktivist Group Becomes More Sophisticated, Targets Critical Infrastructure to Deploy Ransomware

Published on

SIEM as a Service

Follow Us on Google News

A recent report by Cyble has shed light on the evolving tactics of hacktivist groups, moving beyond traditional cyber disruptions like DDoS attacks and website defacements to engage in more advanced critical infrastructure attacks and ransomware operations.

Advanced Attack Strategies

Hacktivism is transforming into a complex tool of hybrid warfare, with groups adopting tactics traditionally associated with nation-state actors and financially motivated cybercriminals.

Groups like NoName057(16), Hacktivist Sandworm, Z-pentest, Sector 16, and Overflame are increasingly targeting NATO-aligned nations and Ukraine supporters, aiming to destabilize critical systems with sophisticated attack methods.

- Advertisement - Google News
Ransomware
Top 10 Most active groups

A notable shift has been the targeting of Industrial Control Systems (ICS) and Operational Technology (OT), with a 50% surge in attacks in March 2025.

This includes a focus on internet-facing infrastructures, now seen as prime targets for political and economic disruption.

Hacktivist groups are engaging in multi-vector attacks, combining DDoS, credential leaks, and ICS disruption to bypass single-layer defenses, showcasing the evolution Cyble had forewarned in its 2024 Annual Report.

The energy and utilities sector has become a focal point for these advanced attacks, affecting everything from energy distribution to water utilities, reflecting a strategic intent to disrupt services critical to national resilience.

Countries experiencing notable cyber hostilities include:

  • Israel: A persistent target with an uptick in attacks in March, driven by pro-Palestinian hacktivists reacting to ongoing conflicts in Gaza.
  • India: With the highest number of incidents in January, likely due to its growing strategic visibility and regional rivalries.
  • U.S.: A noticeable increase in attacks in March, correlated with new administration policies including strikes in Yemen and import tariffs.
  • NATO Countries: France, Italy, and Spain faced sustained attacks, with Spain seeing a sharp rise in March as part of reprisals against NATO members for support of Ukraine.

Ransomware and Data Exfiltration

Several hacktivist groups have integrated ransomware into their operations, blurring the lines between politically motivated attacks and cybercrime:

  • BO Team: Targeted a Russian industrial manufacturer linked to the Ministry of Defense, encrypting over 1,000 hosts and 300TB of data, culminating in a $50,000 Bitcoin ransom payment.
  • Yellow Drift: Compromised over 250TB of government data from the Tomsk region in Russia and 550TB from the national e-procurement system.
  • C.A.S.: Carried out a coordinated cyber operation against a Russian tech firm, exfiltrating approximately 3 terabytes of internal corporate data and partially destroying the company’s infrastructure.
  • Moroccan Dragons: Announced the development of their ransomware program, M-DragonsWare, though specifics remain undisclosed.

Additionally, Cyble has observed increased sophistication in website attacks, with hacktivist groups like ParanoidHax, THE ANON 69, Indohaxsec, and Defacer Kampung engaging in SQL Injection, brute forcing web panels, exploiting OWASP vulnerabilities, and Dorking to discover misconfigurations.

This evolving landscape necessitates a proactive approach to cybersecurity:

  • Network Segmentation: To limit the spread of attacks within infrastructure.
  • Zero Trust Frameworks: Ensuring verification and securing communications at every level.
  • Ransomware-Resistant Backups: Protecting critical data to mitigate the impact of ransomware attacks.
  • Monitoring of Network, Endpoint, and Cloud Assets: To detect and respond swiftly to emerging threats.

Cyble’s attack surface management solutions can be instrumental in scanning for exposures, prioritizing fixes, and monitoring for leaked credentials, providing early warning signs of major cyberattacks.

As hacktivism continues to evolve, organizations must adapt their cybersecurity strategies to guard against these increasing risks effectively.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities

A sweeping wave of suspicious online activity is putting organizations on alert as hackers...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities

A sweeping wave of suspicious online activity is putting organizations on alert as hackers...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...